Description
n8n is a workflow automation platform. Prior to version 1.99.0, there is a denial of Service vulnerability in /rest/binary-data endpoint when processing empty filesystem URIs (filesystem:// or filesystem-v2://). This allows authenticated attackers to cause service unavailability through malformed filesystem URI requests, effecting the /rest/binary-data endpoint and n8n.cloud instances (confirmed HTTP/2 524 timeout responses). Attackers can exploit this by sending GET requests with empty filesystem URIs (filesystem:// or filesystem-v2://) to the /rest/binary-data endpoint, causing resource exhaustion and service disruption. This issue has been patched in version 1.99.0.
References (3)
Core 3
Core References
Patch, Third Party Advisory x_refsource_confirm
https://github.com/n8n-io/n8n/security/advisories/GHSA-pr9r-gxgp-9rm8
Patch x_refsource_misc
https://github.com/n8n-io/n8n/pull/16229
Patch x_refsource_misc
https://github.com/n8n-io/n8n/commit/43c52a8b4f844e91b02e3cc9df92826a2d7b6052
Scores
CVSS v3
4.9
EPSS
0.0029
EPSS Percentile
52.6%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
partial
Details
CWE
CWE-400
Status
published
Products (2)
n8n/n8n
< 1.99.0
npm/n8n
0 - 1.99.0npm
Published
Jul 03, 2025
Tracked Since
Feb 18, 2026